An administrator has enabled salting for users’ passwords on a UNIX box. A penetration tester must attempt to retrieve password hashes. Which of the following
files must the penetration tester use to eventually obtain passwords on the system? (Select TWO).
A.
 /etc/passwd
B.
 /etc/shadow
C.
 /etc/security
D.
 /etc/password
E.
 /sbin/logon
F.
 /bin/bash